|
Message-ID: <2236FBA76BA1254E88B949DDB74E612B41B71ECD@IRSMSX102.ger.corp.intel.com>
Date: Fri, 5 Aug 2016 07:53:32 +0000
From: "Reshetova, Elena" <elena.reshetova@...el.com>
To: James Morris <jmorris@...ei.org>
CC: "kernel-hardening@...ts.openwall.com"
<kernel-hardening@...ts.openwall.com>,
"linux-security-module@...r.kernel.org"
<linux-security-module@...r.kernel.org>, "keescook@...omium.org"
<keescook@...omium.org>, "spender@...ecurity.net" <spender@...ecurity.net>,
"Schaufler, Casey" <casey.schaufler@...el.com>, "Leibowitz, Michael"
<michael.leibowitz@...el.com>, "Roberts, William C"
<william.c.roberts@...el.com>
Subject: RE: [RFC] [PATCH 0/5] Hardchroot LSM + additional hooks
Subject: Re: [RFC] [PATCH 0/5] Hardchroot LSM + additional hooks
On Fri, 29 Jul 2016, Elena Reshetova wrote:
> fs/fhandle.c | 5 +
> fs/fs_struct.c | 7 +-
> fs/namespace.c | 15 +-
> fs/open.c | 3 +
> include/linux/lsm_hooks.h | 37 ++
> include/linux/security.h | 19 +
> kernel/fork.c | 5 +
> security/Kconfig | 1 +
> security/Makefile | 2 +
> security/hardchroot/Kconfig | 10 +
> security/hardchroot/Makefile | 3 +
> security/hardchroot/hardchroot_lsm.c | 654
+++++++++++++++++++++++++++++++++++
> security/security.c | 30 ++
> 13 files changed, 786 insertions(+), 5 deletions(-) create mode
> 100644 security/hardchroot/Kconfig create mode 100644
> security/hardchroot/Makefile create mode 100644
> security/hardchroot/hardchroot_lsm.c
> Please cc: Al Viro on these changes.
Sure, will do it on the next patch version. Have quite a few things to fix
first.
Download attachment "smime.p7s" of type "application/pkcs7-signature" (7586 bytes)
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.